On Friday, May 18, 2018 at 10:52:25 AM UTC-7, Tim Hollebeek wrote:
> > Our logging of the CAA records processed does not provide the case
> > information we need to determine whether other issuances were affected by
> > this bug.
> 
> We put a requirement in the BRs specifically so this problem could not occur:
> 
> "The CA SHALL log all actions taken, if any, consistent with its processing 
> practice."

To be clear, we do log every CAA lookup 
(https://github.com/letsencrypt/boulder/blob/master/va/caa.go#L47). However, we 
do it at too high a level of abstraction: It doesn't contain the unprocessed 
return values from DNS. We plan to improve that as part of our remediation.

Our ideal would be to log all DNS traffic associated with each issuance, 
including A, AAAA, TXT, and CAA lookups. We initially experimented with this by 
capturing the full verbose output from our recursive resolver, but concluded 
that it was not usable for investigations because it was not possible to 
associate specific query/response pairs with the validation request that caused 
them (for instance, consider NS referrals, CNAME indirection, and caching). I 
think this is definitely an area of improvement we could pursue in the DNS 
ecosystem that would be particularly beneficial for CAs.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to